Resources banner

Title - Resources Page

PROOFPOINT

Resources

Resources

Advanced options

Infographic: Are You Prepared for a Data Breach?

Infographic: Are You Prepared for a Data Breach?

Infographic: Are You Prepared for a Data Breach?

Download this infographic to learn more about the financial implications of a data breach, common gaps in organizations' security posture that allow breaches in, and strategies organizations can take to minimize their attack surface. 

Dealing with Data Breach and Data Loss Prevention

Dealing with Data Breach and Data Loss Prevention

Dealing with Data Breach and Data Loss Prevention

White Paper

Download the latest research report from Osterman Research, Inc, in which Osterman details their latest research into top IT organizations and their preparedness for a data breach.

Top 8 Healthcare Archiving and eDiscovery Requirements

Top 8 Healthcare Archiving and eDiscovery Requirements

Top 8 Healthcare Archiving and eDiscovery Requirements

White Paper

Download this white paper to learn the top concerns of healthcare providers from an archiving and eDiscovery perspectivem, the major trends in litigation and regulatory investigations as well as how to respond to them, and the adoption rates and results of cloud and mobile technologies among healthcare providers

Email Management Best Practices Guide

Email Management Best Practices Guide

Email Management Best Practices Guide

White Paper

Read Setting Retention Policy: A Best Practice Guide to get practical advice on how to manage retention polices to align with your assessments of business value and information risk. 

Advanced Threat Detection: Necessary but Not Sufficient

Advanced Threat Detection: Necessary but Not Sufficient

Advanced Threat Detection: Necessary but Not Sufficient

White Paper

Download this white paper to learn the fallacies of detection in depth, why detection tools can lead to missed security alerts, and tips and questions to ask detection tool vendors to maximize return on detection solutions

Security Analytics Pitfalls: Quick Patch or Long Term Solution

Security Analytics Pitfalls: Quick Patch or Long Term Solution

Security Analytics Pitfalls: Quick Patch or Long Term Solution

White Paper

Download this white paper to learn key questions to ask security analytics vendors, a structured approach to preparing and understanding the commitments necessary for security analytics, and recommendations and tips for achieving the results promised by security analytics from existing technology

Solving Puzzles: Threat Intelligence-Fueled Incident Response

Solving Puzzles: Threat Intelligence-Fueled Incident Response

Solving Puzzles: Threat Intelligence-Fueled Incident Response

Webinars

View this on-demand webinar to listen in as our experts discuss key context and intelligence applications, gaps, and limitations impacting security teams today and provides a sneak peek at Proofpoint’s new threat intelligence acquisition, Emerging Threats.

Social Media Risk Management: Best Practices of Top Brands

Social Media Risk Management: Best Practices of Top Brands

Social Media Risk Management: Best Practices of Top Brands

Webinars

View this on-demand webinar to hear Devin Redmond, VP and General Manager of Nexgate, and guest speaker Nick Hayes of Forrester Research, Inc. as they share Hayes' latest research into brand protection for the modern enterprise and discusses the key corporate social media risks and how the top social brands are managing these risks in the face of a changing social risk landscape.

Adopt Office 365 Now, but Address Security First!

Adopt Office 365 Now, but Address Security First!

Adopt Office 365 Now, but Address Security First!

Webinars

Download this on-demand webinar and hear from industry analyst Michael Osterman, from Osterman Research, and subject matter expert Joe Diamond for an in-depth discussion around where Office 365 requires augmentation, and how to best approach buy-in from stakeholders across the organization.

Data Breach Mitigation: Hardening Against Loss in 2015

Data Breach Mitigation: Hardening Against Loss in 2015

Data Breach Mitigation: Hardening Against Loss in 2015

Webinars

Download this on-demand webinar to listen in as Proofpoint's Joe Diamond speaks with guest speaker Mike Osterman, CEO and Founder of Osterman Research, about his recent research into the top challenges IT and Information Security professionals face today, what they expect to see in 2015, and how they are tackling these challenges. 

What to Expect from eDiscovery in 2015

What to Expect from eDiscovery in 2015

What to Expect from eDiscovery in 2015

Webinars

Download this on-demand webinar featuring special guest Jonathan Rudolph, former Deputy District Attorney for the State of New Jersey and eDiscovery expert, as we discuss how  organizations can better address increasingly complex regulatory environments in the coming year.

Stop the Bleeding: Advanced Threats and Incident Response in the Modern Enterprise

Stop the Bleeding: Advanced Threats and Incident Response in the Modern Enterprise

Stop the Bleeding: Advanced Threats and Incident Response in the Modern Enterprise

Webinars

Download the on-demand webinar and hear from our guest speaker, Forrester Research's Rick Holland, and Proofpoint’s Mike Horn as they discuss how the threat landscape has evolved and how building effective intelligence makes the difference in keeping your organization safe.

Proofpoint Archive for Financial Services: March 2015 Update

Proofpoint Archive for Financial Services: March 2015 Update

Proofpoint Archive for Financial Services: March 2015 Update

Webinars

Download this on-demand webinar to learn more about how Proofpoint continues to innovate in the Archive space for Financial Services organizations. 

Enterprise Social Media Risk and Regulatory Compliance in 2015: Are You in Control?

Enterprise Social Media Risk and Regulatory Compliance in 2015: Are You in Control?

Enterprise Social Media Risk and Regulatory Compliance in 2015: Are You in Control?

Webinars

Download this on-demand webinar for a discussion featuring Proofpoint's Robert Cruz, Senior Director of eDiscovery Solutions and guest speakers Nick Hayes from Forrester Research, Inc. and Devin Redmond, the GM of Nexgate – now a division of Proofpoint – who will be sharing their expertise, client-driven insights, and latest research into enterprise social media risk and how your organization can be better prepared to embrace social in 2015.

Stop, Drop, and Roll: Using Next Generation Protection to Fight Advanced Security Threats

Stop, Drop, and Roll: Using Next Generation Protection to Fight Advanced Security Threats

Stop, Drop, and Roll: Using Next Generation Protection to Fight Advanced Security Threats

Webinars

Download the on-demand webinar to learn more about how predictive analytics and defense represent the next generation of protection, what detection technology should be focusing on, and how automated context, verification and containment are accelerating response time by up to 20x.

Enabling Advanced Security and Compliance for Office 365

Enabling Advanced Security and Compliance for Office 365

Enabling Advanced Security and Compliance for Office 365

Webinars

Download the on-demand webinar for a discussion on the top questions revolving around Office 365, complex security requirements, and protection from advanced email security threats.

Prevent a Data Breach: Stay Out of the Headlines & Save Money Through Encryption

Prevent a Data Breach: Stay Out of the Headlines & Save Money Through Encryption

Prevent a Data Breach: Stay Out of the Headlines & Save Money Through Encryption

Webinars

Download the on-demand webinar to take a closer look at recent noted data breach and the associated costs and risks, the changing regulatory landscape around data breaches, and best practices for implementing encryption without interrupting business. 

When Obscurity and Security Are a Good Idea: How User-Transparent Email Encryption Creates Better Compliance

When Obscurity and Security Are a Good Idea: How User-Transparent Email Encryption Creates Better Compliance

When Obscurity and Security Are a Good Idea: How User-Transparent Email Encryption Creates Better Compliance

Webinars

Download the on-demand webinar for a comprehensive look at when obscurity and security are a good idea and how user-transparent email encryption creates better compliance.

How's the Phishing in Your Watering Hole: The Interplay of Phishing and Browser-Based Attacks

How's the Phishing in Your Watering Hole: The Interplay of Phishing and Browser-Based Attacks

How's the Phishing in Your Watering Hole: The Interplay of Phishing and Browser-Based Attacks

Webinars

Download this highly recommended on-demand webinar to learn more about phishing and watering holes, the controversy with watering holes as the "phisher's toolkit," and a demo of Threat Response and how it plays into the larger Proofpoint security suite.

Best Practices in Social Media Management and Archiving

Best Practices in Social Media Management and Archiving

Best Practices in Social Media Management and Archiving

Webinars

Register now for the on-demand webinar with Michael Osterman, Founder and CEO of Osterman Research, where we discuss his recent survey of social media practices best practices, including current state of social media adoption, state of internal social media policies, and recent regulatory guidance on social media.

Privacy in the Wild: Real Life Stories of Transparent Encryption and DLP

Privacy in the Wild: Real Life Stories of Transparent Encryption and DLP

Privacy in the Wild: Real Life Stories of Transparent Encryption and DLP

Webinars

Download the on-demand webinar to listen in as privacy experts cover aspects of outbound email security and compliance controls that enterprises are tackling today, and provide their perspective on avenues for enterprises to investigate for getting around such hurdles.

Strategies for Defending Against Targeted Attacks

Strategies for Defending Against Targeted Attacks

Strategies for Defending Against Targeted Attacks

Webinars

Download the on-demand webinar, featuring guest speaker Rick Holland of Forrester Research, Inc. as he joins Proofpoint to discuss today's threat environment, advanced targeted attacks, and how to protect your organization against the next generation of rapidly evolving email attacks.

Tweets, Feed, & Chatter: Social Media and Regulatory Compliance in 2014

Tweets, Feed, & Chatter: Social Media and Regulatory Compliance in 2014

Tweets, Feed, & Chatter: Social Media and Regulatory Compliance in 2014

Webinars

Download this on-demand webinar to learn more about what the top concerns with social media compliance are in 2014, and how your organization can address them.

Trends Driving Information Governance Strategies in 2014

Trends Driving Information Governance Strategies in 2014

Trends Driving Information Governance Strategies in 2014

Webinars

Download this on-demand webinar to learn more about how the challenges of information growth, regulatory compliance complexity, and legal discovery will change in 2014. 

Longline Phishing and the Human Factor: Who's Clicking, Why, and How

Longline Phishing and the Human Factor: Who's Clicking, Why, and How

Longline Phishing and the Human Factor: Who's Clicking, Why, and How

Webinars

Download the on-demand webinar as our threat experts delve into the research and provide insight as to how attacks are changing.

Plugging the Email Security Gap

Plugging the Email Security Gap

Plugging the Email Security Gap

Webinars

Download this on-demand webinar that explores the most recent threats of email and how to prevent those threats.

Proofpoint Threat Report (April 2015)

Proofpoint Threat Report (April 2015)

Proofpoint Threat Report (April 2015)

Threat Report

The following report explores specific threats, trends, and transformations that Proofpoint is seeing both within the Proofpoint customer base and in the wider marketplace.

Cloud Data Security

Cloud Data Security

White Paper

WHO CONTROLS YOUR INFORMATION ON THE CLOUD?

Read how to make sure all of your data on the cloud is secure and under your control.

Healthcare Privacy & Security

Healthcare Privacy & Security

Webinars

SECURING INFORMATION PRIVACY
Examines best practices for preventing cyber attacks before they happen and remediation when they do.

Financial Services and Cybersecurity

Financial Services and Cybersecurity

Financial Services and Cybersecurity

White Paper

Financial Services and Regulatory Focus on Cybersecurity
Learn about actions taken in 2014-2015 to help financial services firms understand cybersecurity and combat threats. 

The Human Factor 2015

The Human Factor 2015

The Human Factor 2015

Threat Report

The Human Factor 2015
Gain new insight into the ways attackers exploit end-users' psychology.

Accelerating Office 365 Adoption

Accelerating Office 365 Adoption

Accelerating Office 365 Adoption

White Paper

Accelerating Office 365 Adoption
Learn how Proofpoint can augment security and compliance gaps and smooth the path to user adoption.

Enterprise Governance

Enterprise Governance

Enterprise Governance

Datasheet

Download this data sheet to learn more about Proofpoint Enterprise Governance.

Proofpoint Threat Report (January 2015)

Proofpoint Threat Report (January 2015)

Proofpoint Threat Report (January 2015)

Threat Report

The following report explores specific threats, trends, and transformations that Proofpoint is seeing both within the Proofpoint customer base and in the wider marketplace.

Proofpoint Threat Report (August 2014)

Proofpoint Threat Report (August 2014)

Proofpoint Threat Report (August 2014)

Threat Report

The following report explores specific threats, trends, and transformations that Proofpoint is seeing both within the Proofpoint customer base and in the wider marketplace.

Proofpoint Threat Report (October 2014)

Proofpoint Threat Report (October 2014)

Proofpoint Threat Report (October 2014)

Threat Report

The following report explores specific threats, trends, and transformations that Proofpoint is seeing both within the Proofpoint customer base and in the wider marketplace.

Proofpoint Threat Report (November 2014)

Proofpoint Threat Report (November 2014)

Proofpoint Threat Report (November 2014)

Threat Report

The following report explores specific threats, trends, and transformations that Proofpoint is seeing both within the Proofpoint customer base and in the wider marketplace.

Proofpoint Threat Report (July 2013)

Proofpoint Threat Report (July 2013)

Threat Report

The following report explores specific threats, trends, and transformations that Proofpoint is seeing both within the Proofpoint customer base and in the wider marketplace.

Proofpoint Threat Report (November 2013)

Proofpoint Threat Report (November 2013)

The following report explores specific threats, trends, and transformations that Proofpoint is seeing both within the Proofpoint customer base and in the wider marketplace.

Proofpoint Threat Report (December 2013)

Proofpoint Threat Report (December 2013)

Proofpoint Threat Report (December 2013)

Threat Report

The following report explores specific threats, trends, and transformations that Proofpoint is seeing both within the Proofpoint customer base and in the wider marketplace.

Proofpoint Threat Report (July 2014)

Proofpoint Threat Report (July 2014)

Threat Report

The following report explores specific threats, trends, and transformations that Proofpoint is seeing both within the Proofpoint customer base and in the wider marketplace.

Proofpoint Threat Report (December 2014)

Proofpoint Threat Report (December 2014)

Proofpoint Threat Report (December 2014)

Threat Report

The following report explores specific threats, trends, and transformations that Proofpoint is seeing both within the Proofpoint customer base and in the wider marketplace.

Proofpoint Threat Report (February 2015)

Proofpoint Threat Report (February 2015)

Proofpoint Threat Report (February 2015)

Threat Report

The following report explores specific threats, trends, and transformations that Proofpoint is seeing both within the Proofpoint customer base and in the wider marketplace.

Proofpoint Threat Report (March 2015)

Proofpoint Threat Report (March 2015)

Proofpoint Threat Report (March 2015)

Threat Report

The following report explores specific threats, trends, and transformations that Proofpoint is seeing both within the Proofpoint customer base and in the wider marketplace.

Content Control Data Sheet

Content Control Data Sheet

Datasheet

Download this data sheet to learn how Proofpoint Enterprise Content Control is the industry’s first cloud-based solution designed from the ground up to identify and remediate sensitive content sprawled across an enterprise. 

Best Practices for Migrating to Office 365

Best Practices for Migrating to Office 365

Best Practices for Migrating to Office 365

White Paper

This white paper is intended to help decision makers understand the implications of migrating to Office 365, and offers practical advice and data from O365 enabled organizations.

Sentrion MVP

Sentrion MVP

Sentrion MVP

Datasheet

Download this datasheet to learn about Proofpoint Sentrion's high-performance virtual message processor.

Sentrion Sendmail

Sentrion Sendmail

Sentrion Sendmail

Datasheet

Download this datasheet to learn about Proofpoint Sentrion's scaleable platform for enterprise messaging infrastructure and applications.

Threat Response Video

Threat Response Video

Video

Watch the video to hear from Kevin Moore of Fenwick and West as he talks about using Threat Response in real world situations.

Enterprise Archive for SEC and FINRA Compliance

Enterprise Archive for SEC and FINRA Compliance

Enterprise Archive for SEC and FINRA Compliance

Datasheet

Proofpoint Enterprise Archive allows financial organizations to govern and discover a wide range of data including email, instant message conversations, and documents, with data managed to address all requirements outlined by SEC 17a3-4.